SEC595: Applied Data Science and AI/Machine Learning for Cybersecurity Professionals

Experience SANS training through course previews.
Learn MoreLet us help.
Contact usBecome a member for instant access to our free resources.
Sign UpWe're here to help.
Contact UsThese days, we hear a lot about Pen-Testing (attempting to penetrate a system's security layers in order to demonstrate security risk. While these types of studies are useful and effective, they tend to require specific skills, training, and experience in areas that network professionals are usually not exposed to. This paper looks at Vulnerability Identification Studies which focus on identifying the enticements, common vulnerabilities, and information leakage, the things that account for most of the risk to IT (Information Technology) that we face today.